CVE-2026-33407: CWE-918: Server-Side Request Forgery (SSRF) in ellite Wallos
CVE-2026-33407 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in ellite's Wallos, an open-source personal subscription tracker. Versions prior to 4. 7. 0 improperly accept and use HTTP_PROXY and HTTPS_PROXY environment variables without validation, allowing attackers to hijack proxy settings. The vulnerability arises because the server performs DNS resolution on user-supplied search terms, enabling attackers to trigger outbound requests to arbitrary domains via manipulated proxy settings. Exploitation requires no authentication or user interaction and can lead to significant confidentiality and integrity impacts by allowing attackers to access internal resources or exfiltrate data. The issue has been patched in version 4. 7. 0, and no known exploits are currently reported in the wild. Organizations using affected versions should upgrade immediately and review proxy environment variable handling to mitigate risks.
AI Analysis
Technical Summary
CVE-2026-33407 is a Server-Side Request Forgery (SSRF) vulnerability identified in ellite's Wallos, a self-hostable personal subscription tracker application. The flaw exists in versions prior to 4.7.0, where the application’s endpoint at endpoints/logos/search.php accepts HTTP_PROXY and HTTPS_PROXY environment variables from user input without proper validation or sanitization. This improper handling allows attackers to manipulate proxy settings used by the server when performing DNS resolution on user-supplied search terms. Since the server resolves these search terms, an attacker can craft inputs that cause the server to send outbound requests to arbitrary domains through attacker-controlled proxies. This proxy hijacking can be leveraged to bypass network restrictions, access internal services, or exfiltrate sensitive information. The vulnerability is classified under CWE-918 (SSRF) and CWE-922 (Incomplete Control of Resource Identifiers). The CVSS v4.0 score is 8.3 (high severity), reflecting the vulnerability’s network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability. The vulnerability has been patched in Wallos version 4.7.0, and no public exploits have been reported yet. However, the nature of SSRF and proxy manipulation poses a significant risk if exploited.
Potential Impact
The SSRF vulnerability in Wallos can have severe consequences for organizations deploying affected versions. Attackers can exploit this flaw to make the server initiate unauthorized requests to internal or external systems, potentially bypassing firewalls or network segmentation. This can lead to unauthorized access to sensitive internal services, data leakage, or disruption of service availability. Since Wallos is a personal subscription tracker, it may be deployed in small to medium organizations or by individuals, but if integrated into larger environments or exposed to the internet, the risk escalates. The ability to hijack proxy settings increases the attack surface, enabling attackers to route malicious traffic through the victim server, complicating detection and attribution. The lack of authentication or user interaction requirements further increases the threat, allowing remote attackers to exploit the vulnerability at scale. Organizations could face data breaches, service outages, or lateral movement within their networks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Wallos to version 4.7.0 or later, where the issue has been patched. Until upgrading is possible, administrators should disable or restrict the use of HTTP_PROXY and HTTPS_PROXY environment variables within the application environment to prevent proxy hijacking. Implement strict input validation and sanitization on all user-supplied data, especially those influencing network requests or environment variables. Network-level controls such as egress filtering and firewall rules should be enforced to restrict outbound traffic from the Wallos server to only trusted destinations. Monitoring and logging outbound requests from the application can help detect anomalous behavior indicative of SSRF exploitation attempts. Additionally, consider deploying web application firewalls (WAFs) with SSRF detection capabilities. Regular security assessments and code reviews focusing on environment variable handling and external request logic are recommended to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-33407: CWE-918: Server-Side Request Forgery (SSRF) in ellite Wallos
Description
CVE-2026-33407 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in ellite's Wallos, an open-source personal subscription tracker. Versions prior to 4. 7. 0 improperly accept and use HTTP_PROXY and HTTPS_PROXY environment variables without validation, allowing attackers to hijack proxy settings. The vulnerability arises because the server performs DNS resolution on user-supplied search terms, enabling attackers to trigger outbound requests to arbitrary domains via manipulated proxy settings. Exploitation requires no authentication or user interaction and can lead to significant confidentiality and integrity impacts by allowing attackers to access internal resources or exfiltrate data. The issue has been patched in version 4. 7. 0, and no known exploits are currently reported in the wild. Organizations using affected versions should upgrade immediately and review proxy environment variable handling to mitigate risks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33407 is a Server-Side Request Forgery (SSRF) vulnerability identified in ellite's Wallos, a self-hostable personal subscription tracker application. The flaw exists in versions prior to 4.7.0, where the application’s endpoint at endpoints/logos/search.php accepts HTTP_PROXY and HTTPS_PROXY environment variables from user input without proper validation or sanitization. This improper handling allows attackers to manipulate proxy settings used by the server when performing DNS resolution on user-supplied search terms. Since the server resolves these search terms, an attacker can craft inputs that cause the server to send outbound requests to arbitrary domains through attacker-controlled proxies. This proxy hijacking can be leveraged to bypass network restrictions, access internal services, or exfiltrate sensitive information. The vulnerability is classified under CWE-918 (SSRF) and CWE-922 (Incomplete Control of Resource Identifiers). The CVSS v4.0 score is 8.3 (high severity), reflecting the vulnerability’s network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and availability. The vulnerability has been patched in Wallos version 4.7.0, and no public exploits have been reported yet. However, the nature of SSRF and proxy manipulation poses a significant risk if exploited.
Potential Impact
The SSRF vulnerability in Wallos can have severe consequences for organizations deploying affected versions. Attackers can exploit this flaw to make the server initiate unauthorized requests to internal or external systems, potentially bypassing firewalls or network segmentation. This can lead to unauthorized access to sensitive internal services, data leakage, or disruption of service availability. Since Wallos is a personal subscription tracker, it may be deployed in small to medium organizations or by individuals, but if integrated into larger environments or exposed to the internet, the risk escalates. The ability to hijack proxy settings increases the attack surface, enabling attackers to route malicious traffic through the victim server, complicating detection and attribution. The lack of authentication or user interaction requirements further increases the threat, allowing remote attackers to exploit the vulnerability at scale. Organizations could face data breaches, service outages, or lateral movement within their networks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Wallos to version 4.7.0 or later, where the issue has been patched. Until upgrading is possible, administrators should disable or restrict the use of HTTP_PROXY and HTTPS_PROXY environment variables within the application environment to prevent proxy hijacking. Implement strict input validation and sanitization on all user-supplied data, especially those influencing network requests or environment variables. Network-level controls such as egress filtering and firewall rules should be enforced to restrict outbound traffic from the Wallos server to only trusted destinations. Monitoring and logging outbound requests from the application can help detect anomalous behavior indicative of SSRF exploitation attempts. Additionally, consider deploying web application firewalls (WAFs) with SSRF detection capabilities. Regular security assessments and code reviews focusing on environment variable handling and external request logic are recommended to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-19T17:02:34.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c32654f4197a8e3b9def6e
Added to database: 3/25/2026, 12:03:32 AM
Last enriched: 3/25/2026, 12:03:58 AM
Last updated: 3/25/2026, 1:05:25 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.